Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61726 (GCVE-0-2025-61726)
Vulnerability from cvelistv5 – Published: 2026-01-28 19:30 – Updated: 2026-01-29 18:31- CWE-400 - Uncontrolled Resource Consumption
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | net/url |
Affected:
0 , < 1.24.12
(semver)
Affected: 1.25.0 , < 1.25.6 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-61726",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-29T18:31:39.150633Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-29T18:31:59.685Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "net/url",
"product": "net/url",
"programRoutines": [
{
"name": "parseQuery"
},
{
"name": "ParseQuery"
},
{
"name": "URL.Query"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.24.12",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.25.6",
"status": "affected",
"version": "1.25.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "jub0bs"
}
],
"descriptions": [
{
"lang": "en",
"value": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T19:30:31.215Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/736712"
},
{
"url": "https://go.dev/issue/77101"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"title": "Memory exhaustion in query parameter parsing in net/url"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-61726",
"datePublished": "2026-01-28T19:30:31.215Z",
"dateReserved": "2025-09-30T15:05:03.605Z",
"dateUpdated": "2026-01-29T18:31:59.685Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61726\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-01-28T20:16:09.713\",\"lastModified\":\"2026-02-06T18:47:34.520\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.12\",\"matchCriteriaId\":\"21FD9368-8AB3-404B-8599-BBF64EFE3C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.6\",\"matchCriteriaId\":\"A547E844-78D2-4B17-B7A9-73E7B503D2CE\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/736712\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/77101\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc\",\"source\":\"security@golang.org\",\"tags\":[\"Release Notes\",\"Mailing List\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4341\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61726\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-29T18:31:39.150633Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-29T18:31:55.540Z\"}}], \"cna\": {\"title\": \"Memory exhaustion in query parameter parsing in net/url\", \"credits\": [{\"lang\": \"en\", \"value\": \"jub0bs\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"net/url\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.12\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.25.0\", \"lessThan\": \"1.25.6\", \"versionType\": \"semver\"}], \"packageName\": \"net/url\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"parseQuery\"}, {\"name\": \"ParseQuery\"}, {\"name\": \"URL.Query\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/736712\"}, {\"url\": \"https://go.dev/issue/77101\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4341\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-01-28T19:30:31.215Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61726\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-29T18:31:59.685Z\", \"dateReserved\": \"2025-09-30T15:05:03.605Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-01-28T19:30:31.215Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:2920
Vulnerability from csaf_redhat - Published: 2026-02-18 12:55 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2920",
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2920.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-02-19T15:17:16+00:00",
"generator": {
"date": "2026-02-19T15:17:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2920",
"initial_release_date": "2026-02-18T12:55:46+00:00",
"revision_history": [
{
"date": "2026-02-18T12:55:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T12:55:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.src",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.src",
"product_id": "grafana-0:10.2.6-18.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:2754
Vulnerability from csaf_redhat - Published: 2026-02-16 15:43 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.9.18 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.9.18",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2754",
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2754.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.9.18",
"tracking": {
"current_release_date": "2026-02-19T15:17:12+00:00",
"generator": {
"date": "2026-02-19T15:17:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2754",
"initial_release_date": "2026-02-16T15:43:51+00:00",
"revision_history": [
{
"date": "2026-02-16T15:43:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T17:04:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.9",
"product": {
"name": "Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.9::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770249996"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770223960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770249993"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770230842"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770133825"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770991332"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770306794"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770991979"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770133364"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770856103"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ac30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770223960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770230842"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Adbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770991332"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ab3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770306794"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770133364"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770856103"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3Ae2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770223960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770230842"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770991332"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770306794"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Abb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770133364"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770856103"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64 as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"relates_to_product_reference": "Red Hat Quay 3.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le as a component of Red Hat Quay 3.9",
"product_id": "Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:23e78fc33f834e7642200ebd89a25f6df96086ebc85b7b796c12defdaf6db55f_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:2a0c6197cfdf75f8e61c9b0b87c4ac6698eb2bd74b80a1a18b8aa7e3b58a7b01_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/clair-rhel8@sha256:b3a69da280042a4a49b46b4c5d68fb801fdfb48ca34838ea95f8689bfd7cec7f_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:1ed8034054fb250e96f4ae309456ad9c91c85a4f48e6bad04ee3a941ddf5bd6d_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1afddea1de67e463112304bbcc542ea3d9196007555b081019272d54726500d6_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:3697f2c97db2d2bc79bd5497cac707527aa20a515dc8518b2cbe90558d12b9a0_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:7affc63bf40c45403c588abf5dfb1d0f4c5927167a55710bc428fd6162171ed8_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:783306371d102407ac1ed97c329cf370324538c7bfe35476d0530e79472a036b_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:30a5752fa7bfa250cbd36e4d96a2109f539cd8a00b51f6b7e091161ac212b5dd_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:4f8a3dbc431ebd001943b4d2af1a0bd616462e1773e6af87fb03fe0f4e788b2c_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-builder-rhel8@sha256:dbded8952fe20c611f5f0c75df4e4361f71a7416d7e5a9c69f837c6a6f3a55e3_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:2d53cc0c05bfa533348e4b4718707688dbfed79f3c6fc2e78b49881c7cd4bd66_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8087b2f8f5b4b11368129427a054891e7a5cfedfe2a0e403aedc1d4ff0d9a053_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:c30ff14fc21c1656c3dede8d71b5424db37974215fb6ba5941a3c82613527a75_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:e2feb4a831e033a4ead342e72357c28e7c0ed7681bdd4c4d150ef1ecf968923b_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-bundle@sha256:0b79ca52ec69f9ca331876132740653f6ee6c7c01df176268cd581c67d3627e1_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:435ec27ca9b4cee51effcb277e34b999f148725a1f2e7b8bde52d76730a41904_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:889a5c7117b71ee4001bfaedbc88bd87055d2969b7d4b232a604e0559d6e39f8_ppc64le",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-operator-rhel8@sha256:bb73f7061e402e9b5beb80afbb4d521d9caa1a3745f8f645d0458e78fe4de592_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:53559b73783776cad55684eaac61524a9c17669cb62b5794737c3e4c5688d874_s390x",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8add5a3b448723ff62e1ede9749cc970516a6af55045bd63ede8062b11fe4faf_amd64",
"Red Hat Quay 3.9:registry.redhat.io/quay/quay-rhel8@sha256:8bd901f9d03817e599a73b4f4355236320bec1b803bd9507383277f27fde4319_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
RHSA-2026:2709
Vulnerability from csaf_redhat - Published: 2026-02-16 10:32 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2709",
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2709.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-19T15:17:10+00:00",
"generator": {
"date": "2026-02-19T15:17:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2709",
"initial_release_date": "2026-02-16T10:32:31+00:00",
"revision_history": [
{
"date": "2026-02-16T10:32:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:32:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_id": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.src",
"product": {
"name": "golang-0:1.25.7-1.el9_7.src",
"product_id": "golang-0:1.25.7-1.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src"
},
"product_reference": "golang-0:1.25.7-1.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2708
Vulnerability from csaf_redhat - Published: 2026-02-16 10:08 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2708",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2708.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-19T15:17:10+00:00",
"generator": {
"date": "2026-02-19T15:17:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2708",
"initial_release_date": "2026-02-16T10:08:41+00:00",
"revision_history": [
{
"date": "2026-02-16T10:08:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:08:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2706
Vulnerability from csaf_redhat - Published: 2026-02-16 09:40 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2706",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2706.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-19T15:17:09+00:00",
"generator": {
"date": "2026-02-19T15:17:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2706",
"initial_release_date": "2026-02-16T09:40:31+00:00",
"revision_history": [
{
"date": "2026-02-16T09:40:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T09:40:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_id": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.src",
"product": {
"name": "golang-0:1.25.7-1.el10_1.src",
"product_id": "golang-0:1.25.7-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src"
},
"product_reference": "golang-0:1.25.7-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2914
Vulnerability from csaf_redhat - Published: 2026-02-18 11:31 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2914",
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2914.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-02-19T15:17:16+00:00",
"generator": {
"date": "2026-02-19T15:17:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2914",
"initial_release_date": "2026-02-18T11:31:17+00:00",
"revision_history": [
{
"date": "2026-02-18T11:31:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T11:31:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.src",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.src",
"product_id": "grafana-0:10.2.6-22.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:2681
Vulnerability from csaf_redhat - Published: 2026-02-12 17:29 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.16.2 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.16.2",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2681",
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-31133",
"url": "https://access.redhat.com/security/cve/CVE-2025-31133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2681.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.16.2",
"tracking": {
"current_release_date": "2026-02-19T15:17:06+00:00",
"generator": {
"date": "2026-02-19T15:17:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2681",
"initial_release_date": "2026-02-12T17:29:21+00:00",
"revision_history": [
{
"date": "2026-02-12T17:29:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T18:38:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.16",
"product": {
"name": "Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.16::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816239"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel9@sha256%3A1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770762347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3Adda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770817752"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel9@sha256%3A5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816399"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770230686"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel9@sha256%3A8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816438"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel9@sha256%3A9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816381"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3Afa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770841176"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel9@sha256%3A64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816415"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel9@sha256%3A35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770836901"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel9@sha256%3Ae3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770762347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel9@sha256%3Ac96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816399"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel9@sha256%3A76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816438"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel9@sha256%3Aafe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816381"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel9@sha256%3A8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816415"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel9@sha256%3A9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770836901"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel9@sha256%3A9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770762347"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel9@sha256%3A3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816399"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel9@sha256%3A146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816438"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel9@sha256%3Abf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816381"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel9@sha256%3Abbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770816415"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel9@sha256%3A45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770836901"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel9@sha256%3A96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770836901"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64 as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"relates_to_product_reference": "Red Hat Quay 3.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le as a component of Red Hat Quay 3.16",
"product_id": "Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-45337",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2024-12-11T19:00:54.247490+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331720"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "RHBZ#2331720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"category": "external",
"summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"category": "external",
"summary": "https://go.dev/cl/635315",
"url": "https://go.dev/cl/635315"
},
{
"category": "external",
"summary": "https://go.dev/issue/70779",
"url": "https://go.dev/issue/70779"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3321",
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"release_date": "2024-12-11T18:55:58.506000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-31133",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:17:18.235000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404705"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This flaw exploits an issue with how masked paths are implementedin runc. When masking files, runc will bind-mount the container\u0027s /dev/null inode on top of the file. However, if an attacker can replace /dev/null with a symlink to some other procfs file, runc will instead bind-mount the symlink target read-write.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: container escape via \u0027masked path\u0027 abuse due to mount race conditions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31133"
},
{
"category": "external",
"summary": "RHBZ#2404705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31133"
}
],
"release_date": "2025-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using user namespaces, with the host root user not mapped into the container\u0027s namespace. procfs file permissions are managed using Unix\nDAC and thus user namespaces stop a container process from being able to write to them.\n\n* Not running as a root user in the container (this includes disabling setuid binaries with noNewPrivileges). As above, procfs file permissions are managed using Unix DAC and thus non-root users cannot write to them.\n\n* Depending on the maskedPath configuration (the default configuratio nonly masks paths in /proc and /sys), using an AppArmor that blocks unexpectedwrites to any maskedPaths (as is the case with the defaultprofile used by Docker and Podman) will block attempts to exploit this issue. However, CVE-2025-52881 allows an attacker to bypass LSMlabels, and so this mitigation is not helpful when considered incombination with CVE-2025-52881.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: container escape via \u0027masked path\u0027 abuse due to mount race conditions"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T17:29:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:9784029a9d44a605dd28583416a7322c84189f4ee8e1bfa1be822d9260639d35_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:afe2137c2002e07f27b105b9db90030ca0f3347a038ab8418d257dabe7aefcd1_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/clair-rhel9@sha256:bf85b1b91bcbaea8cb0fc021d1f590ba3da4e0b2f8703cb449791ece5930d68c_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:dda553368706ad66215cc95b9b0306808531b0ed92b7dc7880cd2c95f8e0faed_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:3b252ccf24df27ea02a005d734eb501abf989b97b5d9e3ff57aa3b7e9633f165_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:5eb5f4aafd4fa3b53c6477424946f743bf5236ac434ddffa8a887a26a47e0fab_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-bridge-operator-rhel9@sha256:c96f472d44fff765175c4ee77ddb94bfac580105900f5e21274e959099bb97fa_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:6ac48cf92c9bb3d6eac9645ef203bcd2e475da36c182eed9ceadc3490e77a042_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:146699ff1cd4f8fdf19594ad5ce11dcafe9f8a266c94b104826c871b675f92e1_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:76354449e4e8b67bfbbfae10337b7d50fc657c909c8798fddb95dee408c3a9f2_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-builder-rhel9@sha256:8166562a51177faff8e520980153e1760a4863417a824ac15deb4314afcf1925_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:77387c33232561396c8826a393d17771bf88aaad90436c4e1e5aa36891840b16_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:1f03a49fec5f575e98c3f37ee081d5510a87172e72bc66627f935314d11a67c4_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:9969081b9da11f5a56d3ebf9ccd9428d9d59741c058abe4510e7ae3375a11519_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-container-security-operator-rhel9@sha256:e3ab3a505d3d08f7bad3c899f40727e2de524cd14c4c44b00f44b7b42f7ddd21_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-bundle@sha256:fa64c1d47fc10d14120ec9e7afc2e253620fdc28592f4d859350db4fbdf0fae2_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:64adacf9cccd05601f4a7b38a7cd55d55291583dc9d33e4cfd1e4fd426cd0936_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:8a1b8eedcb8e36ddfb1982062ad379c4f65f95260545d05d0cf10918427089d8_ppc64le",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-operator-rhel9@sha256:bbbd11d9b959ef12ae61a7975ffb08541797b0fad2d098781ec4543fd4ac2893_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:35e3dc29e64bae8c0b35d7884281397c58165a5b145676919452a02b9f56ee4c_amd64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:45de5fc478cb2734b672630c67ffee4e6b98954848b97ea9a1cc9903a53dbf8e_s390x",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:96588daff01f27db2ee335dcd957e9dec7f38a2c573e2968d9bc5835edc2957b_arm64",
"Red Hat Quay 3.16:registry.redhat.io/quay/quay-rhel9@sha256:9f58fc80db29fa44684c6e39bb2eda06e86ba34801d5e04468941ac8d0b754eb_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
RHSA-2026:2844
Vulnerability from csaf_redhat - Published: 2026-02-17 18:20 - Updated: 2026-02-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.26.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "3.26.1 includes CVE fixes for CVE-2025-15467, CVE-2025-6176, CVE-2026-1761, CVE-2026-0719, CVE-2025-61732, and CVE-2025-61726.\nRed Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.\nThe 3.26 release is based on Eclipse Che 7.113 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2.\nUsers still using the v1 standard should migrate as soon as possible.\nhttps://devfile.io/docs/2.2.0/migrating-to-devfile-v2\nDev Spaces supports OpenShift EUS releases v4.16 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates.\nhttps://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2844",
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61732",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-0719",
"url": "https://access.redhat.com/security/cve/CVE-2026-0719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1761",
"url": "https://access.redhat.com/security/cve/CVE-2026-1761"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2844.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release.",
"tracking": {
"current_release_date": "2026-02-19T15:17:14+00:00",
"generator": {
"date": "2026-02-19T15:17:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2844",
"initial_release_date": "2026-02-17T18:20:32+00:00",
"revision_history": [
{
"date": "2026-02-17T18:20:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-17T18:20:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T15:17:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.26::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Ad93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Ae81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Af13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ae724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3A1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770925072"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Accedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Aa03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Aa9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Affdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Ab503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ad37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Ac2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Ab01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Acfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Aa644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Aee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ac5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Ab151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Ad8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Abb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Aa67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Ad198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Acb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ab69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Af3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"acknowledgments": [
{
"names": [
"treeplus"
]
}
],
"cve": "CVE-2026-0719",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2026-01-08T12:09:43.352000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed this vulnerability as Important severity due to its remote exploitability and lack of authentication requirements. Successful exploitation allows an attacker to crash any client or service using libsoup\u2019s NTLM authentication mechanism. The root cause is improper handling of signed integer arithmetic, which leads to stack buffer overflow and denial-of-service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0719"
},
{
"category": "external",
"summary": "RHBZ#2427906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0719"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477",
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication"
},
{
"acknowledgments": [
{
"names": [
"Naoki Wakamatsu"
]
}
],
"cve": "CVE-2026-1761",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2026-02-02T12:51:56.172000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2435961"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT flaw in libsoup involves a stack-based buffer overflow during the parsing of multipart HTTP responses. A remote attacker can exploit this vulnerability by sending a specially crafted response, leading to memory corruption and potentially arbitrary code execution or application crashes in Red Hat products that utilize libsoup to process untrusted server responses. This issue does not require authentication or user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1761"
},
{
"category": "external",
"summary": "RHBZ#2435961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1761",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1761"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1761",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1761"
}
],
"release_date": "2026-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing libsoup that process HTTP responses should be configured to only communicate with trusted endpoints. Implement network egress filtering to restrict vulnerable applications from connecting to untrusted external services, thereby reducing the exposure to specially crafted multipart HTTP responses.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response"
}
]
}
OPENSUSE-SU-2026:10064-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10064",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10064-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.25-1.25.6-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10064-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-1.1.aarch64",
"product_id": "go1.25-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product_id": "go1.25-race-1.25.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-1.1.ppc64le",
"product_id": "go1.25-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-1.25.6-1.1.s390x",
"product_id": "go1.25-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product_id": "go1.25-doc-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product_id": "go1.25-libstd-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-1.1.s390x",
"product_id": "go1.25-race-1.25.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-1.1.x86_64",
"product_id": "go1.25-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product_id": "go1.25-race-1.25.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10063-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.24-1.24.12-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.24-1.24.12-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10063",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10063-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.24-1.24.12-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10063-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-1.1.aarch64",
"product_id": "go1.24-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product_id": "go1.24-race-1.24.12-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-1.1.ppc64le",
"product_id": "go1.24-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product_id": "go1.24-libstd-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-1.24.12-1.1.s390x",
"product_id": "go1.24-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product_id": "go1.24-doc-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product_id": "go1.24-libstd-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-1.1.s390x",
"product_id": "go1.24-race-1.24.12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-1.1.x86_64",
"product_id": "go1.24-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product_id": "go1.24-race-1.24.12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20077-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20077-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:33Z",
"generator": {
"date": "2026-01-22T12:53:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20077-1",
"initial_release_date": "2026-01-22T12:53:33Z",
"revision_history": [
{
"date": "2026-01-22T12:53:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20085-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 15:49 - Updated: 2026-01-22 15:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20085-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:49:20Z",
"generator": {
"date": "2026-01-22T15:49:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20085-1",
"initial_release_date": "2026-01-22T15:49:20Z",
"revision_history": [
{
"date": "2026-01-22T15:49:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
cleanstart-2026-fi29887
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-fips package. During the TLS 1. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.1-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-fips package. During the TLS 1. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FI29887",
"modified": "2026-02-12T13:07:54Z",
"published": "2026-02-13T00:39:44.225771Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FI29887.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-273p-m2cw-6833"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-4c4x-jm2x-pf9j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-4qg8-fj49-pxjh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-6m8w-jc87-6cr7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-846p-jg2w-w324"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-f83f-xpx7-ffpw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-fcv2-xgw5-pqxf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-fphv-w9fq-2525"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-whqx-f9j3-ch6m"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During the TLS 1",
"upstream": [
"CVE-2025-47907",
"CVE-2025-61726",
"CVE-2025-61730",
"CVE-2025-68119",
"GHSA-273p-m2cw-6833",
"GHSA-2x5j-vhc8-9cwm",
"GHSA-4c4x-jm2x-pf9j",
"GHSA-4qg8-fj49-pxjh",
"GHSA-6m8w-jc87-6cr7",
"GHSA-846p-jg2w-w324",
"GHSA-f83f-xpx7-ffpw",
"GHSA-fcv2-xgw5-pqxf",
"GHSA-fphv-w9fq-2525",
"GHSA-vvgc-356p-c3xw",
"GHSA-whqx-f9j3-ch6m"
]
}
SUSE-SU-2026:0297-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:10 - Updated: 2026-01-26 16:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0297-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:10:54Z",
"generator": {
"date": "2026-01-26T16:10:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0297-1",
"initial_release_date": "2026-01-26T16:10:54Z",
"revision_history": [
{
"date": "2026-01-26T16:10:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0219-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:13 - Updated: 2026-01-22 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-219,SUSE-SLE-Module-Development-Tools-15-SP7-2026-219,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219,openSUSE-SLE-15.6-2026-219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0219-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0219-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260219-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0219-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:13:47Z",
"generator": {
"date": "2026-01-22T12:13:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0219-1",
"initial_release_date": "2026-01-22T12:13:47Z",
"revision_history": [
{
"date": "2026-01-22T12:13:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-1.24.12-150000.1.53.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0298-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:11 - Updated: 2026-01-26 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0298-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0298-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260298-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0298-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:11:04Z",
"generator": {
"date": "2026-01-26T16:11:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0298-1",
"initial_release_date": "2026-01-26T16:11:04Z",
"revision_history": [
{
"date": "2026-01-26T16:11:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0296-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:51 - Updated: 2026-01-26 13:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0296-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-26T13:51:05Z",
"generator": {
"date": "2026-01-26T13:51:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0296-1",
"initial_release_date": "2026-01-26T13:51:05Z",
"revision_history": [
{
"date": "2026-01-26T13:51:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0218-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:12 - Updated: 2026-01-22 12:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-218,SUSE-SLE-Module-Development-Tools-15-SP7-2026-218,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218,openSUSE-SLE-15.6-2026-218",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0218-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0218-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260218-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0218-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T12:12:47Z",
"generator": {
"date": "2026-01-22T12:12:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0218-1",
"initial_release_date": "2026-01-22T12:12:47Z",
"revision_history": [
{
"date": "2026-01-22T12:12:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-1.25.6-150000.1.26.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0308-1
Vulnerability from csaf_suse - Published: 2026-01-28 08:38 - Updated: 2026-01-28 08:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0308-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-28T08:38:40Z",
"generator": {
"date": "2026-01-28T08:38:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0308-1",
"initial_release_date": "2026-01-28T08:38:40Z",
"revision_history": [
{
"date": "2026-01-28T08:38:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:20122-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20122-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20122-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20122-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:24Z",
"generator": {
"date": "2026-01-22T12:53:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20122-1",
"initial_release_date": "2026-01-22T12:53:24Z",
"revision_history": [
{
"date": "2026-01-22T12:53:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:20132-1
Vulnerability from csaf_suse - Published: 2026-01-22 15:53 - Updated: 2026-01-22 15:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20132-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20132-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620132-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20132-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:53:13Z",
"generator": {
"date": "2026-01-22T15:53:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20132-1",
"initial_release_date": "2026-01-22T15:53:13Z",
"revision_history": [
{
"date": "2026-01-22T15:53:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
CNVD-2026-10649
Vulnerability from cnvd - Published: 2026-02-09厂商已发布了漏洞修复程序,请及时关注更新: https://go.dev/dl/
| Name | ['Google GO >=1.25.0,<1.25.6', 'Google GO <1.24.12'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-61726",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
}
},
"description": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u79cd\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\n\nGoogle Go\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u9650\u5236\u67e5\u8be2\u53c2\u6570\u6570\u91cf\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u89e3\u6790\u5927\u91cf\u53c2\u6570\u65f6\u6d88\u8017\u8fc7\u591a\u5185\u5b58\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://go.dev/dl/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-10649",
"openTime": "2026-02-09",
"patchDescription": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u79cd\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\r\n\r\nGoogle Go\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u9650\u5236\u67e5\u8be2\u53c2\u6570\u6570\u91cf\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u89e3\u6790\u5927\u91cf\u53c2\u6570\u65f6\u6d88\u8017\u8fc7\u591a\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Go\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2026-10649\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Google GO \u003e=1.25.0\uff0c\u003c1.25.6",
"Google GO \u003c1.24.12"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"serverity": "\u9ad8",
"submitTime": "2026-02-05",
"title": "Google Go\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2026-10649\uff09"
}
WID-SEC-W-2026-0129
Vulnerability from csaf_certbund - Published: 2026-01-15 23:00 - Updated: 2026-02-16 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren oder vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0129 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0129.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0129 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129"
},
{
"category": "external",
"summary": "Go 1.25.6 and Go 1.24.12 release notes vom 2026-01-15",
"url": "https://seclists.org/oss-sec/2026/q1/68"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77101 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77101"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77102 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77102"
},
{
"category": "external",
"summary": "GitHub Golang Issue 76443 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/76443"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77100 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77100"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77099 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77099"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77113 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77113"
},
{
"category": "external",
"summary": "CoreDNS-1.14.1 Release Notes vom 2026-01-19",
"url": "https://coredns.io/2026/01/15/coredns-1.14.-release/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10063-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH2ETRY5I4475P2G36TA426YNBGAZLJM/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10064-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJZDHBHKXYC7TOPJZKAU6QZKMN53VSVC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0219-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0218-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20122-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023968.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10101-1 vom 2026-01-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQGDE5WRPP6NKEPWSYQ5WAJ54HTZCN45/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20132-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023959.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:0032-1 vom 2026-01-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIDNEL2XD2C3R7XQHANV23SKGOE6VLD6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0354-1 vom 2026-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-095 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3135 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3135.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3134 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3134.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-096 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-096.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3138 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3138.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3137 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3137.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3136 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3136.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3146 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3146.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0403-1 vom 2026-02-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2706.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2709.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2708.html"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-16T23:00:00.000+00:00",
"generator": {
"date": "2026-02-17T09:05:55.289+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0129",
"initial_release_date": "2026-01-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE, European Union Vulnerability Database und openSUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon, Go und European Union Vulnerability Database aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.6",
"product": {
"name": "Golang Go \u003c1.25.6",
"product_id": "T050049"
}
},
{
"category": "product_version",
"name": "1.25.6",
"product": {
"name": "Golang Go 1.25.6",
"product_id": "T050049-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.12",
"product": {
"name": "Golang Go \u003c1.24.12",
"product_id": "T050051"
}
},
{
"category": "product_version",
"name": "1.24.12",
"product": {
"name": "Golang Go 1.24.12",
"product_id": "T050051-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.12"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.14.1",
"product": {
"name": "Open Source CoreDNS \u003c1.14.1",
"product_id": "T050073"
}
},
{
"category": "product_version",
"name": "1.14.1",
"product": {
"name": "Open Source CoreDNS 1.14.1",
"product_id": "T050073-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:coredns:coredns:1.14.1"
}
}
}
],
"category": "product_name",
"name": "CoreDNS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68121"
}
]
}
FKIE_CVE-2025-61726
Vulnerability from fkie_nvd - Published: 2026-01-28 20:16 - Updated: 2026-02-06 18:47| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/736712 | Patch | |
| security@golang.org | https://go.dev/issue/77101 | Patch | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc | Release Notes, Mailing List | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4341 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21FD9368-8AB3-404B-8599-BBF64EFE3C7B",
"versionEndExcluding": "1.24.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A547E844-78D2-4B17-B7A9-73E7B503D2CE",
"versionEndExcluding": "1.25.6",
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption."
}
],
"id": "CVE-2025-61726",
"lastModified": "2026-02-06T18:47:34.520",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-28T20:16:09.713",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/736712"
},
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/issue/77101"
},
{
"source": "security@golang.org",
"tags": [
"Release Notes",
"Mailing List"
],
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-GM9R-Q53W-2GH4
Vulnerability from github – Published: 2026-01-28 21:31 – Updated: 2026-01-29 21:30The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
{
"affected": [],
"aliases": [
"CVE-2025-61726"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-28T20:16:09Z",
"severity": "HIGH"
},
"details": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"id": "GHSA-gm9r-q53w-2gh4",
"modified": "2026-01-29T21:30:30Z",
"published": "2026-01-28T21:31:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://go.dev/cl/736712"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77101"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
bit-golang-2025-61726
Vulnerability from bitnami_vulndb
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.12"
},
{
"introduced": "1.25.0"
},
{
"fixed": "1.25.6"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-61726"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"id": "BIT-golang-2025-61726",
"modified": "2026-01-31T09:09:11.750Z",
"published": "2026-01-31T08:43:29.079Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/736712"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77101"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"schema_version": "1.6.2",
"summary": "Memory exhaustion in query parameter parsing in net/url"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.